CVE-2016-9800

Priority
Description
In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump"
function in "tools/parser/hci.c" source file. The issue exists because
"pin" array is overflowed by supplied parameter due to lack of boundary
checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
Notes
mdeslauras of 2019-10-17, appears unfixed
Package
Source: bluez (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was deferred [2017-08-01])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was deferred [2019-10-17])
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2019-10-17)
Ubuntu 18.04 LTS (Bionic Beaver):deferred (2019-10-17)
Ubuntu 19.04 (Disco Dingo):deferred (2019-10-17)
Ubuntu 19.10 (Eoan):deferred (2019-10-17)
More Information

Updated: 2019-10-18 02:29:01 UTC (commit cccfc4426d8c1fbf582a89d981fe7fc812124543)